IT Internal Audit “Hot Topics” April 2011 Agenda Survey Overview Survey Results IT Internal Audit Hot Topics Overview – Social Media and Social Networking.

Slides:



Advertisements
Similar presentations
11 Artis Group Pty Limited Level 4, 655 pacific Highway, St Leonards, NSW, Presentation by Rob Edwards Amazon Web Services &
Advertisements

Strategic Priorities Consultation Survey Overview Strategic Priorities Advisory Committee November 6, 2013.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Cloud Computing Overview of cloud services and how Palm Coast will join the fun.
Survey Results on IT Audit. 2 Comptroller and Auditor General of India  Analyzing trends and development in IT Audit  Framing next WGITA Work Plan.
BUSINESSES AND THEIR EMPLOYEES 11 April. Employers survey, track, or record all or certain aspects of employee’s behavior or performance Workplace Monitoring.
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 The Cloud: A Necessary Risk for Business.
Introduction to Microsoft Office Web Apps with Jim Mollé Learn iT! Computer Software Training.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
The Evolution of IT Risk & Compliance February 2012 Rosalyn Ellis, CRISC Susan Hoffman, CISA,CGEIT 1.
Introduction to Virtualization/Cloud Computing Toolkit Welcome.
SharePoint Server 2013 Features and Scenarios for IT Professionals First Lastname, Title March, 2014 Software Assurance Planning Services.
Steering Committee CSRIC Working Group 2A Cyber Security Best Practices October 7, 2010.
Overview of Systems Audit
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Cloud services security Prof. Manel Medina Head of Unit CERT Operations support ENISA
InfoSecurity Conference 2011 The Challenges of Cloud Computing John R. Robles John R. Robles and Associates
1 Copyright © 2014 M. E. Kabay. All rights reserved. CSH5 Chapter 67 “Developing Classification Policies for Data” Karthik Raman & Kevin Beets Classification.
Security considerations for mobile devices in GoRTT
Cloud Security Alliance Overview and Organizational Plans Jim Reavis, Co-founder & Executive Director August 5, 2009.
About Sally Smoczynski Background in process improvement Consultant in Information Security, Service Management and Business Continuity Strong experience.
CSE9020 Schedule, / 1 The Suggested Schedule Week Content/Deliverable 1. 4/3Unit Overview, Project Description, Meetings, Group Formation 2. 11/3Project.
S-1 © RGP & UW-CISA 2010 Business & Technology Environment Summer 2010 Robert G Parker.
Engineering Essential Characteristics Security Engineering Process Overview.
Service Is So Last Decade hot topics for IT management in the twenty-teens.
Connecting with Your Peers IT Challenges and Opportunities in 2012 A Facilitated Group Discussion Thursday, January 12, 2012.
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
New Mexico State University Information Engineering Technology Bachelor of Science Engineering Technology.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
Senior Management Presentation [Insert your name here]
Information System Analysis Implementation & Security.
1 Calgary SharePoint Users Group The Challenges of Office 365.
IT Security vs Office Administration Efficiency Office Administration Efficiency Date: João Stott.
Minnesota Rules of Professional Conduct Meet the Cloud, Mobile Devices and Social Media Todd C. Scott Minnesota Lawyers Mutual Ins. Co. Alice Sherren Minnesota.
Place image here INFORMATION MANAGEMENT Cloud Computing and Enterprise Information Management March 2010 Jim Cuff VP Strategy, Iron Mountain Digital.
Techies Club III workshop RECAP OF DAY II ACTIVITIES.
Telephone : +234 (0) | Website : Registered company : Telephone : +234.
Sierra Pacific Community College District 7300 College Avenue Sacramento, CA
UOP BIS 221 Entire Course Check this A+ tutorial guideline at BIS 221 Week 1 Individual Overview.
Scales Technology FZCO
Planning & System installation
Control and Protect Information
System Backup IB Computer Science.
Recommendations for 2017 & May 2017
Computer Control & Audit
The Office Is Out: Preservation And Collection In The Merry Old Land Of Office 365 June 26, v1.
Managing Exchange Online using Office 365 Admin Console
San Francisco IIA Fall Seminar
CMGT 431 Competitive Success/snaptutorial.com
CMGT 582 Competitive Success-- snaptutorial.com
CMGT 431 Education for Service-- snaptutorial.com.
CMGT 431 STUDY Lessons in Excellence--cmgt431study.com.
CMGT 582 STUDY Lessons in Excellence--cmgt582study.com.
CMGT 582 Education for Service-- snaptutorial.com
CMGT 431 Teaching Effectively-- snaptutorial.com.
CMGT 431 STUDY Education for Service- -cmgt431study.com.
CMGT 582 Teaching Effectively-- snaptutorial.com
Computer-Based Processing: Developing an Audit Assessment Approach
Synthesizing knowledge During Project
DISCUSSION ON IMPLEMENTATION ON DCS TURNAROUND STRATEGY THEMES
برنامه‌ريزي منابع انساني
Managing Exchange Online using PowerShell
INFORMATION SYSTEMS SECURITY and CONTROL
Managing Exchange Online using Office 365 Admin Console
Security in Cloud Computing
Managing Exchange Online using PowerShell
Enterprise Data Solution Running on the Azure Cloud Platform Protects, Preserves Critical Data “Druva takes a proactive approach to help customers address.
The Most In-Demand Skills for Cloud Computing.
Managing Exchange Online using PowerShell
Presentation transcript:

IT Internal Audit “Hot Topics” April 2011

Agenda Survey Overview Survey Results IT Internal Audit Hot Topics Overview – Social Media and Social Networking – Mobile Computing – Electronic Discovery and Document Retention – Microsoft SharePoint, Knowledge Management Applications – Cloud Computing – IT Governance, Non-alignment of IT Strategy with Business Strategy – Virtualization – Green IT – Data Loss Prevention – Software Asset Management

Survey Questions

Survey Results

IT Internal Audit Hot Topics Overview Social Media and Social Networking IT Security and Risk Considerations

IT Internal Audit Hot Topics Overview Social Media and Social Networking IT Internal Audit Assurance and Advisory Considerations

IT Internal Audit Hot Topics Overview Mobile Computing IT Security and Risk Considerations

IT Internal Audit Hot Topics Overview Mobile Computing IT Internal Audit Assurance and Advisory Considerations

IT Internal Audit Hot Topics Overview E-Discovery and Document Retention IT Security and Risk Considerations

IT Internal Audit Hot Topics Overview E-Discovery and Document Retention IT Internal Audit Assurance and Advisory Considerations

IT Internal Audit Hot Topics Overview Data Loss Prevention - IT Security and Risk Considerations

IT Internal Audit Hot Topics Overview Data Loss Prevention - IT Internal Audit Assurance and Advisory Considerations